Integrated identity based encryption (IBE) data encryption system

A technology of data encryption and authentication system, which is used in transmission systems, electrical components, user identity/authority verification, etc.

Inactive Publication Date: 2013-02-13
WUHAN UNIV OF TECH +1
View PDF3 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] The purpose of the present invention is to provide a kind of integrated IBE data encryption system, this system is to solve IBE data encryption in practical application in IBE key servic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrated identity based encryption (IBE) data encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The specific implementation of the present invention will be further described below.

[0064] Such as figure 1 As shown, the integrated IBE data encryption system based on the present invention consists of an IBE key server, a CA certificate authentication system, an identification authentication system, an IBE service publishing system, an IBE encryption application program, an IBE encryption API, an IBE cipher module, and an IBE key management client It consists of several parts.

[0065] The IBE key server is a service system based on the C / S (Client / Server) mode, and its client is the IBE key management client. The IBE key server can adopt common information system development technology, such as C / C++ or C#.Net or J2EE development language and environment; the generation of its IBE key can be realized by referring to relevant specifications, such as RFC5091. IBE key generation can be implemented either in software or in hardware. The security of information int...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an integrated IBE data encryption system. The system comprises an IBE key server, a certification authority (CA) system, an identification authority system, an IBE service publication system, an IBE encryption application program, an IBE encryption application program interface (API), an IBE crypto module and an IBE key management client. The IBE service publication system publishes related service system information on line, and the encryption application program calls the IBE crypto module through the IBE encryption API to complete IBE data encryption and decryption functions; the IBE crypto module is connected with the IBE key server through the IBE key management client to obtain IBE public parameters and IBE private keys needed for the encryption and decryption; when the private keys are obtained, the IBE key management client obtains identification certifications from the CA system; and in an online interaction process, the key management client proves identities of users by using the identification certifications signed by the CA system. The system solves the key problems of identification safety, identification attribution confirmation, obtaining convenience of the public parameters and the like in IBE encryption.

Description

technical field [0001] The present invention belongs to the technical field of encryption, and is an integrated IBE (Identity Based Encryption) data encryption system, in particular, an integrated CA identity authentication, identity authentication, IBE key service, IBE service publishing, IBE key management, and IBE encryption Applied to the integrated IBE data encryption system. Background technique [0002] Public Key Cryptography (Public Key Cryptography), also known as Asymmetric Key Cryptography (Asymmetric Key Cryptography), involves a pair of interrelated keys (called an asymmetric key pair), one of which can be made public, called the public key cryptography. A key (Public Key), used for data encryption and verification of digital signatures, and another private key (Private Key), owned and saved by a specific entity, used for decryption of encrypted data and digital signatures (so , an asymmetric key pair is also called a public key pair). In order to improve the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 龙毅宏唐志红王斯富白波毛秋阳刘宇
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products